crypto.c 22.1 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
/*
 * QEMU block full disk encryption
 *
 * Copyright (c) 2015-2016 Red Hat, Inc.
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
 * License along with this library; if not, see <http://www.gnu.org/licenses/>.
 *
 */

#include "qemu/osdep.h"

#include "block/block_int.h"
24
#include "block/qdict.h"
25 26 27
#include "sysemu/block-backend.h"
#include "crypto/block.h"
#include "qapi/opts-visitor.h"
28
#include "qapi/qapi-visit-crypto.h"
29
#include "qapi/qobject-input-visitor.h"
30
#include "qapi/error.h"
31
#include "qemu/module.h"
32
#include "qemu/option.h"
33
#include "qemu/cutils.h"
34
#include "crypto.h"
35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59

typedef struct BlockCrypto BlockCrypto;

struct BlockCrypto {
    QCryptoBlock *block;
};


static int block_crypto_probe_generic(QCryptoBlockFormat format,
                                      const uint8_t *buf,
                                      int buf_size,
                                      const char *filename)
{
    if (qcrypto_block_has_format(format, buf, buf_size)) {
        return 100;
    } else {
        return 0;
    }
}


static ssize_t block_crypto_read_func(QCryptoBlock *block,
                                      size_t offset,
                                      uint8_t *buf,
                                      size_t buflen,
60
                                      void *opaque,
61
                                      Error **errp)
62 63 64 65
{
    BlockDriverState *bs = opaque;
    ssize_t ret;

66
    ret = bdrv_pread(bs->file, offset, buf, buflen);
67 68 69 70 71 72 73 74 75 76 77
    if (ret < 0) {
        error_setg_errno(errp, -ret, "Could not read encryption header");
        return ret;
    }
    return ret;
}


struct BlockCryptoCreateData {
    BlockBackend *blk;
    uint64_t size;
M
Maxim Levitsky 已提交
78
    PreallocMode prealloc;
79 80 81 82 83 84 85
};


static ssize_t block_crypto_write_func(QCryptoBlock *block,
                                       size_t offset,
                                       const uint8_t *buf,
                                       size_t buflen,
86
                                       void *opaque,
87
                                       Error **errp)
88 89 90 91
{
    struct BlockCryptoCreateData *data = opaque;
    ssize_t ret;

92
    ret = blk_pwrite(data->blk, offset, buf, buflen, 0);
93 94 95 96 97 98 99 100 101 102
    if (ret < 0) {
        error_setg_errno(errp, -ret, "Could not write encryption header");
        return ret;
    }
    return ret;
}


static ssize_t block_crypto_init_func(QCryptoBlock *block,
                                      size_t headerlen,
103
                                      void *opaque,
104
                                      Error **errp)
105 106
{
    struct BlockCryptoCreateData *data = opaque;
107 108
    Error *local_error = NULL;
    int ret;
109

110
    if (data->size > INT64_MAX || headerlen > INT64_MAX - data->size) {
111 112
        ret = -EFBIG;
        goto error;
113 114
    }

115 116 117 118
    /* User provided size should reflect amount of space made
     * available to the guest, so we must take account of that
     * which will be used by the crypto header
     */
119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135
    ret = blk_truncate(data->blk, data->size + headerlen, false,
                       data->prealloc, 0, &local_error);

    if (ret >= 0) {
        return ret;
    }

error:
    if (ret == -EFBIG) {
        /* Replace the error message with a better one */
        error_free(local_error);
        error_setg(errp, "The requested file size is too large");
    } else {
        error_propagate(errp, local_error);
    }

    return ret;
136 137 138 139 140 141 142
}


static QemuOptsList block_crypto_runtime_opts_luks = {
    .name = "crypto",
    .head = QTAILQ_HEAD_INITIALIZER(block_crypto_runtime_opts_luks.head),
    .desc = {
143
        BLOCK_CRYPTO_OPT_DEF_LUKS_KEY_SECRET(""),
144 145 146 147 148 149 150 151 152 153 154 155 156 157
        { /* end of list */ }
    },
};


static QemuOptsList block_crypto_create_opts_luks = {
    .name = "crypto",
    .head = QTAILQ_HEAD_INITIALIZER(block_crypto_create_opts_luks.head),
    .desc = {
        {
            .name = BLOCK_OPT_SIZE,
            .type = QEMU_OPT_SIZE,
            .help = "Virtual disk size"
        },
158 159 160 161 162 163 164
        BLOCK_CRYPTO_OPT_DEF_LUKS_KEY_SECRET(""),
        BLOCK_CRYPTO_OPT_DEF_LUKS_CIPHER_ALG(""),
        BLOCK_CRYPTO_OPT_DEF_LUKS_CIPHER_MODE(""),
        BLOCK_CRYPTO_OPT_DEF_LUKS_IVGEN_ALG(""),
        BLOCK_CRYPTO_OPT_DEF_LUKS_IVGEN_HASH_ALG(""),
        BLOCK_CRYPTO_OPT_DEF_LUKS_HASH_ALG(""),
        BLOCK_CRYPTO_OPT_DEF_LUKS_ITER_TIME(""),
165 166 167 168 169
        { /* end of list */ }
    },
};


170
QCryptoBlockOpenOptions *
171
block_crypto_open_opts_init(QDict *opts, Error **errp)
172
{
173
    Visitor *v;
174
    QCryptoBlockOpenOptions *ret;
175

176
    v = qobject_input_visitor_new_flat_confused(opts, errp);
177
    if (!v) {
178
        return NULL;
179
    }
180

181
    visit_type_QCryptoBlockOpenOptions(v, NULL, &ret, errp);
182

183
    visit_free(v);
184 185 186 187
    return ret;
}


188
QCryptoBlockCreateOptions *
189
block_crypto_create_opts_init(QDict *opts, Error **errp)
190
{
191
    Visitor *v;
192
    QCryptoBlockCreateOptions *ret;
193

194
    v = qobject_input_visitor_new_flat_confused(opts, errp);
195
    if (!v) {
196
        return NULL;
197
    }
198

199
    visit_type_QCryptoBlockCreateOptions(v, NULL, &ret, errp);
200

201
    visit_free(v);
202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218
    return ret;
}


static int block_crypto_open_generic(QCryptoBlockFormat format,
                                     QemuOptsList *opts_spec,
                                     BlockDriverState *bs,
                                     QDict *options,
                                     int flags,
                                     Error **errp)
{
    BlockCrypto *crypto = bs->opaque;
    QemuOpts *opts = NULL;
    Error *local_err = NULL;
    int ret = -EINVAL;
    QCryptoBlockOpenOptions *open_opts = NULL;
    unsigned int cflags = 0;
219
    QDict *cryptoopts = NULL;
220

221
    bs->file = bdrv_open_child(NULL, options, "file", bs, &child_file, 0,
222 223 224 225 226
                               false, errp);
    if (!bs->file) {
        return -EINVAL;
    }

227 228 229
    bs->supported_write_flags = BDRV_REQ_FUA &
        bs->file->bs->supported_write_flags;

230 231 232 233 234 235 236
    opts = qemu_opts_create(opts_spec, NULL, 0, &error_abort);
    qemu_opts_absorb_qdict(opts, options, &local_err);
    if (local_err) {
        error_propagate(errp, local_err);
        goto cleanup;
    }

237
    cryptoopts = qemu_opts_to_qdict(opts, NULL);
238
    qdict_put_str(cryptoopts, "format", QCryptoBlockFormat_str(format));
239

240
    open_opts = block_crypto_open_opts_init(cryptoopts, errp);
241 242 243 244 245 246 247
    if (!open_opts) {
        goto cleanup;
    }

    if (flags & BDRV_O_NO_IO) {
        cflags |= QCRYPTO_BLOCK_OPEN_NO_IO;
    }
248
    crypto->block = qcrypto_block_open(open_opts, NULL,
249 250 251
                                       block_crypto_read_func,
                                       bs,
                                       cflags,
252
                                       1,
253 254 255 256 257 258 259
                                       errp);

    if (!crypto->block) {
        ret = -EIO;
        goto cleanup;
    }

260
    bs->encrypted = true;
261 262 263

    ret = 0;
 cleanup:
264
    qobject_unref(cryptoopts);
265 266 267 268 269
    qapi_free_QCryptoBlockOpenOptions(open_opts);
    return ret;
}


270 271 272
static int block_crypto_co_create_generic(BlockDriverState *bs,
                                          int64_t size,
                                          QCryptoBlockCreateOptions *opts,
M
Maxim Levitsky 已提交
273
                                          PreallocMode prealloc,
274
                                          Error **errp)
275
{
276 277
    int ret;
    BlockBackend *blk;
278
    QCryptoBlock *crypto = NULL;
279
    struct BlockCryptoCreateData data;
280

E
Eric Blake 已提交
281 282 283 284
    blk = blk_new_with_bs(bs, BLK_PERM_WRITE | BLK_PERM_RESIZE, BLK_PERM_ALL,
                          errp);
    if (!blk) {
        ret = -EPERM;
285
        goto cleanup;
286 287
    }

M
Maxim Levitsky 已提交
288 289 290 291
    if (prealloc == PREALLOC_MODE_METADATA) {
        prealloc = PREALLOC_MODE_OFF;
    }

292 293 294
    data = (struct BlockCryptoCreateData) {
        .blk = blk,
        .size = size,
M
Maxim Levitsky 已提交
295
        .prealloc = prealloc,
296
    };
297

298
    crypto = qcrypto_block_create(opts, NULL,
299 300 301 302 303 304 305 306 307 308 309 310 311
                                  block_crypto_init_func,
                                  block_crypto_write_func,
                                  &data,
                                  errp);

    if (!crypto) {
        ret = -EIO;
        goto cleanup;
    }

    ret = 0;
 cleanup:
    qcrypto_block_free(crypto);
312
    blk_unref(blk);
313 314 315
    return ret;
}

316
static int coroutine_fn
317
block_crypto_co_truncate(BlockDriverState *bs, int64_t offset, bool exact,
318 319
                         PreallocMode prealloc, BdrvRequestFlags flags,
                         Error **errp)
320 321
{
    BlockCrypto *crypto = bs->opaque;
322
    uint64_t payload_offset =
323
        qcrypto_block_get_payload_offset(crypto->block);
324 325 326 327 328

    if (payload_offset > INT64_MAX - offset) {
        error_setg(errp, "The requested file size is too large");
        return -EFBIG;
    }
329 330 331

    offset += payload_offset;

332
    return bdrv_co_truncate(bs->file, offset, exact, prealloc, 0, errp);
333 334 335 336 337 338 339 340
}

static void block_crypto_close(BlockDriverState *bs)
{
    BlockCrypto *crypto = bs->opaque;
    qcrypto_block_free(crypto->block);
}

341 342 343 344 345 346
static int block_crypto_reopen_prepare(BDRVReopenState *state,
                                       BlockReopenQueue *queue, Error **errp)
{
    /* nothing needs checking */
    return 0;
}
347

348 349 350 351 352
/*
 * 1 MB bounce buffer gives good performance / memory tradeoff
 * when using cache=none|directsync.
 */
#define BLOCK_CRYPTO_MAX_IO_SIZE (1024 * 1024)
353 354

static coroutine_fn int
355 356
block_crypto_co_preadv(BlockDriverState *bs, uint64_t offset, uint64_t bytes,
                       QEMUIOVector *qiov, int flags)
357 358
{
    BlockCrypto *crypto = bs->opaque;
359
    uint64_t cur_bytes; /* number of bytes in current iteration */
360 361 362 363
    uint64_t bytes_done = 0;
    uint8_t *cipher_data = NULL;
    QEMUIOVector hd_qiov;
    int ret = 0;
364 365 366 367 368 369 370
    uint64_t sector_size = qcrypto_block_get_sector_size(crypto->block);
    uint64_t payload_offset = qcrypto_block_get_payload_offset(crypto->block);

    assert(!flags);
    assert(payload_offset < INT64_MAX);
    assert(QEMU_IS_ALIGNED(offset, sector_size));
    assert(QEMU_IS_ALIGNED(bytes, sector_size));
371 372 373

    qemu_iovec_init(&hd_qiov, qiov->niov);

374 375
    /* Bounce buffer because we don't wish to expose cipher text
     * in qiov which points to guest memory.
376 377
     */
    cipher_data =
378
        qemu_try_blockalign(bs->file->bs, MIN(BLOCK_CRYPTO_MAX_IO_SIZE,
379 380 381 382 383 384
                                              qiov->size));
    if (cipher_data == NULL) {
        ret = -ENOMEM;
        goto cleanup;
    }

385 386
    while (bytes) {
        cur_bytes = MIN(bytes, BLOCK_CRYPTO_MAX_IO_SIZE);
387 388

        qemu_iovec_reset(&hd_qiov);
389
        qemu_iovec_add(&hd_qiov, cipher_data, cur_bytes);
390

391 392
        ret = bdrv_co_preadv(bs->file, payload_offset + offset + bytes_done,
                             cur_bytes, &hd_qiov, 0);
393 394 395 396
        if (ret < 0) {
            goto cleanup;
        }

397 398
        if (qcrypto_block_decrypt(crypto->block, offset + bytes_done,
                                  cipher_data, cur_bytes, NULL) < 0) {
399 400 401 402
            ret = -EIO;
            goto cleanup;
        }

403
        qemu_iovec_from_buf(qiov, bytes_done, cipher_data, cur_bytes);
404

405 406
        bytes -= cur_bytes;
        bytes_done += cur_bytes;
407 408 409 410 411 412 413 414 415 416 417
    }

 cleanup:
    qemu_iovec_destroy(&hd_qiov);
    qemu_vfree(cipher_data);

    return ret;
}


static coroutine_fn int
418 419
block_crypto_co_pwritev(BlockDriverState *bs, uint64_t offset, uint64_t bytes,
                        QEMUIOVector *qiov, int flags)
420 421
{
    BlockCrypto *crypto = bs->opaque;
422
    uint64_t cur_bytes; /* number of bytes in current iteration */
423 424 425 426
    uint64_t bytes_done = 0;
    uint8_t *cipher_data = NULL;
    QEMUIOVector hd_qiov;
    int ret = 0;
427 428 429
    uint64_t sector_size = qcrypto_block_get_sector_size(crypto->block);
    uint64_t payload_offset = qcrypto_block_get_payload_offset(crypto->block);

430
    assert(!(flags & ~BDRV_REQ_FUA));
431 432 433
    assert(payload_offset < INT64_MAX);
    assert(QEMU_IS_ALIGNED(offset, sector_size));
    assert(QEMU_IS_ALIGNED(bytes, sector_size));
434 435 436

    qemu_iovec_init(&hd_qiov, qiov->niov);

437 438
    /* Bounce buffer because we're not permitted to touch
     * contents of qiov - it points to guest memory.
439 440
     */
    cipher_data =
441
        qemu_try_blockalign(bs->file->bs, MIN(BLOCK_CRYPTO_MAX_IO_SIZE,
442 443 444 445 446 447
                                              qiov->size));
    if (cipher_data == NULL) {
        ret = -ENOMEM;
        goto cleanup;
    }

448 449
    while (bytes) {
        cur_bytes = MIN(bytes, BLOCK_CRYPTO_MAX_IO_SIZE);
450

451
        qemu_iovec_to_buf(qiov, bytes_done, cipher_data, cur_bytes);
452

453 454
        if (qcrypto_block_encrypt(crypto->block, offset + bytes_done,
                                  cipher_data, cur_bytes, NULL) < 0) {
455 456 457 458 459
            ret = -EIO;
            goto cleanup;
        }

        qemu_iovec_reset(&hd_qiov);
460
        qemu_iovec_add(&hd_qiov, cipher_data, cur_bytes);
461

462
        ret = bdrv_co_pwritev(bs->file, payload_offset + offset + bytes_done,
463
                              cur_bytes, &hd_qiov, flags);
464 465 466 467
        if (ret < 0) {
            goto cleanup;
        }

468 469
        bytes -= cur_bytes;
        bytes_done += cur_bytes;
470 471 472 473 474 475 476 477 478
    }

 cleanup:
    qemu_iovec_destroy(&hd_qiov);
    qemu_vfree(cipher_data);

    return ret;
}

479 480 481 482 483 484 485
static void block_crypto_refresh_limits(BlockDriverState *bs, Error **errp)
{
    BlockCrypto *crypto = bs->opaque;
    uint64_t sector_size = qcrypto_block_get_sector_size(crypto->block);
    bs->bl.request_alignment = sector_size; /* No sub-sector I/O */
}

486 487 488 489 490 491

static int64_t block_crypto_getlength(BlockDriverState *bs)
{
    BlockCrypto *crypto = bs->opaque;
    int64_t len = bdrv_getlength(bs->file->bs);

492 493
    uint64_t offset = qcrypto_block_get_payload_offset(crypto->block);
    assert(offset < INT64_MAX);
494 495 496 497

    if (offset > len) {
        return -EIO;
    }
498 499 500 501 502 503 504

    len -= offset;

    return len;
}


505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565
static BlockMeasureInfo *block_crypto_measure(QemuOpts *opts,
                                              BlockDriverState *in_bs,
                                              Error **errp)
{
    g_autoptr(QCryptoBlockCreateOptions) create_opts = NULL;
    Error *local_err = NULL;
    BlockMeasureInfo *info;
    uint64_t size;
    size_t luks_payload_size;
    QDict *cryptoopts;

    /*
     * Preallocation mode doesn't affect size requirements but we must consume
     * the option.
     */
    g_free(qemu_opt_get_del(opts, BLOCK_OPT_PREALLOC));

    size = qemu_opt_get_size_del(opts, BLOCK_OPT_SIZE, 0);

    if (in_bs) {
        int64_t ssize = bdrv_getlength(in_bs);

        if (ssize < 0) {
            error_setg_errno(&local_err, -ssize,
                             "Unable to get image virtual_size");
            goto err;
        }

        size = ssize;
    }

    cryptoopts = qemu_opts_to_qdict_filtered(opts, NULL,
            &block_crypto_create_opts_luks, true);
    qdict_put_str(cryptoopts, "format", "luks");
    create_opts = block_crypto_create_opts_init(cryptoopts, &local_err);
    qobject_unref(cryptoopts);
    if (!create_opts) {
        goto err;
    }

    if (!qcrypto_block_calculate_payload_offset(create_opts, NULL,
                                                &luks_payload_size,
                                                &local_err)) {
        goto err;
    }

    /*
     * Unallocated blocks are still encrypted so allocation status makes no
     * difference to the file size.
     */
    info = g_new(BlockMeasureInfo, 1);
    info->fully_allocated = luks_payload_size + size;
    info->required = luks_payload_size + size;
    return info;

err:
    error_propagate(errp, local_err);
    return NULL;
}


566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582
static int block_crypto_probe_luks(const uint8_t *buf,
                                   int buf_size,
                                   const char *filename) {
    return block_crypto_probe_generic(Q_CRYPTO_BLOCK_FORMAT_LUKS,
                                      buf, buf_size, filename);
}

static int block_crypto_open_luks(BlockDriverState *bs,
                                  QDict *options,
                                  int flags,
                                  Error **errp)
{
    return block_crypto_open_generic(Q_CRYPTO_BLOCK_FORMAT_LUKS,
                                     &block_crypto_runtime_opts_luks,
                                     bs, options, flags, errp);
}

K
Kevin Wolf 已提交
583 584 585 586 587 588
static int coroutine_fn
block_crypto_co_create_luks(BlockdevCreateOptions *create_options, Error **errp)
{
    BlockdevCreateOptionsLUKS *luks_opts;
    BlockDriverState *bs = NULL;
    QCryptoBlockCreateOptions create_opts;
M
Maxim Levitsky 已提交
589
    PreallocMode preallocation = PREALLOC_MODE_OFF;
K
Kevin Wolf 已提交
590 591 592 593 594 595 596 597 598 599 600 601 602 603 604
    int ret;

    assert(create_options->driver == BLOCKDEV_DRIVER_LUKS);
    luks_opts = &create_options->u.luks;

    bs = bdrv_open_blockdev_ref(luks_opts->file, errp);
    if (bs == NULL) {
        return -EIO;
    }

    create_opts = (QCryptoBlockCreateOptions) {
        .format = Q_CRYPTO_BLOCK_FORMAT_LUKS,
        .u.luks = *qapi_BlockdevCreateOptionsLUKS_base(luks_opts),
    };

M
Maxim Levitsky 已提交
605 606 607 608
    if (luks_opts->has_preallocation) {
        preallocation = luks_opts->preallocation;
    }

K
Kevin Wolf 已提交
609
    ret = block_crypto_co_create_generic(bs, luks_opts->size, &create_opts,
M
Maxim Levitsky 已提交
610
                                         preallocation, errp);
K
Kevin Wolf 已提交
611 612 613 614 615 616 617 618 619 620
    if (ret < 0) {
        goto fail;
    }

    ret = 0;
fail:
    bdrv_unref(bs);
    return ret;
}

621 622
static int coroutine_fn block_crypto_co_create_opts_luks(BlockDriver *drv,
                                                         const char *filename,
623 624
                                                         QemuOpts *opts,
                                                         Error **errp)
625
{
626 627 628
    QCryptoBlockCreateOptions *create_opts = NULL;
    BlockDriverState *bs = NULL;
    QDict *cryptoopts;
M
Maxim Levitsky 已提交
629 630
    PreallocMode prealloc;
    char *buf = NULL;
631 632
    int64_t size;
    int ret;
M
Maxim Levitsky 已提交
633
    Error *local_err = NULL;
634 635 636 637

    /* Parse options */
    size = qemu_opt_get_size_del(opts, BLOCK_OPT_SIZE, 0);

M
Maxim Levitsky 已提交
638 639 640 641 642 643 644 645 646
    buf = qemu_opt_get_del(opts, BLOCK_OPT_PREALLOC);
    prealloc = qapi_enum_parse(&PreallocMode_lookup, buf,
                               PREALLOC_MODE_OFF, &local_err);
    g_free(buf);
    if (local_err) {
        error_propagate(errp, local_err);
        return -EINVAL;
    }

647 648 649 650
    cryptoopts = qemu_opts_to_qdict_filtered(opts, NULL,
                                             &block_crypto_create_opts_luks,
                                             true);

651 652
    qdict_put_str(cryptoopts, "format", "luks");
    create_opts = block_crypto_create_opts_init(cryptoopts, errp);
653 654 655 656 657 658 659 660
    if (!create_opts) {
        ret = -EINVAL;
        goto fail;
    }

    /* Create protocol layer */
    ret = bdrv_create_file(filename, opts, errp);
    if (ret < 0) {
661
        goto fail;
662 663 664 665 666 667 668 669 670 671
    }

    bs = bdrv_open(filename, NULL, NULL,
                   BDRV_O_RDWR | BDRV_O_RESIZE | BDRV_O_PROTOCOL, errp);
    if (!bs) {
        ret = -EINVAL;
        goto fail;
    }

    /* Create format layer */
M
Maxim Levitsky 已提交
672
    ret = block_crypto_co_create_generic(bs, size, create_opts, prealloc, errp);
673 674 675 676 677 678
    if (ret < 0) {
        goto fail;
    }

    ret = 0;
fail:
679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695
    /*
     * If an error occurred, delete 'filename'. Even if the file existed
     * beforehand, it has been truncated and corrupted in the process.
     */
    if (ret && bs) {
        Error *local_delete_err = NULL;
        int r_del = bdrv_co_delete_file(bs, &local_delete_err);
        /*
         * ENOTSUP will happen if the block driver doesn't support
         * the 'bdrv_co_delete_file' interface. This is a predictable
         * scenario and shouldn't be reported back to the user.
         */
        if ((r_del < 0) && (r_del != -ENOTSUP)) {
            error_report_err(local_delete_err);
        }
    }

696 697
    bdrv_unref(bs);
    qapi_free_QCryptoBlockCreateOptions(create_opts);
698
    qobject_unref(cryptoopts);
699
    return ret;
700 701
}

702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719
static int block_crypto_get_info_luks(BlockDriverState *bs,
                                      BlockDriverInfo *bdi)
{
    BlockDriverInfo subbdi;
    int ret;

    ret = bdrv_get_info(bs->file->bs, &subbdi);
    if (ret != 0) {
        return ret;
    }

    bdi->unallocated_blocks_are_zero = false;
    bdi->cluster_size = subbdi.cluster_size;

    return 0;
}

static ImageInfoSpecific *
720
block_crypto_get_specific_info_luks(BlockDriverState *bs, Error **errp)
721 722 723 724 725
{
    BlockCrypto *crypto = bs->opaque;
    ImageInfoSpecific *spec_info;
    QCryptoBlockInfo *info;

726
    info = qcrypto_block_get_info(crypto->block, errp);
727 728 729
    if (!info) {
        return NULL;
    }
730
    assert(info->format == Q_CRYPTO_BLOCK_FORMAT_LUKS);
731 732 733 734 735 736 737 738 739 740 741 742 743 744

    spec_info = g_new(ImageInfoSpecific, 1);
    spec_info->type = IMAGE_INFO_SPECIFIC_KIND_LUKS;
    spec_info->u.luks.data = g_new(QCryptoBlockInfoLUKS, 1);
    *spec_info->u.luks.data = info->u.luks;

    /* Blank out pointers we've just stolen to avoid double free */
    memset(&info->u.luks, 0, sizeof(info->u.luks));

    qapi_free_QCryptoBlockInfo(info);

    return spec_info;
}

745 746 747 748 749 750
static const char *const block_crypto_strong_runtime_opts[] = {
    BLOCK_CRYPTO_OPT_LUKS_KEY_SECRET,

    NULL
};

751
static BlockDriver bdrv_crypto_luks = {
752 753 754 755 756
    .format_name        = "luks",
    .instance_size      = sizeof(BlockCrypto),
    .bdrv_probe         = block_crypto_probe_luks,
    .bdrv_open          = block_crypto_open_luks,
    .bdrv_close         = block_crypto_close,
F
Fam Zheng 已提交
757 758 759
    /* This driver doesn't modify LUKS metadata except when creating image.
     * Allow share-rw=on as a special case. */
    .bdrv_child_perm    = bdrv_filter_default_perms,
K
Kevin Wolf 已提交
760
    .bdrv_co_create     = block_crypto_co_create_luks,
761
    .bdrv_co_create_opts = block_crypto_co_create_opts_luks,
762
    .bdrv_co_truncate   = block_crypto_co_truncate,
763 764
    .create_opts        = &block_crypto_create_opts_luks,

765
    .bdrv_reopen_prepare = block_crypto_reopen_prepare,
766 767 768
    .bdrv_refresh_limits = block_crypto_refresh_limits,
    .bdrv_co_preadv     = block_crypto_co_preadv,
    .bdrv_co_pwritev    = block_crypto_co_pwritev,
769
    .bdrv_getlength     = block_crypto_getlength,
770
    .bdrv_measure       = block_crypto_measure,
771 772
    .bdrv_get_info      = block_crypto_get_info_luks,
    .bdrv_get_specific_info = block_crypto_get_specific_info_luks,
773

M
Max Reitz 已提交
774 775
    .is_format          = true,

776
    .strong_runtime_opts = block_crypto_strong_runtime_opts,
777 778 779 780 781 782 783 784
};

static void block_crypto_init(void)
{
    bdrv_register(&bdrv_crypto_luks);
}

block_init(block_crypto_init);